Archive

Today, President Barack Obama announced the creation of a Cyber Security department of the U.S. government to combat hacks into the national internet infrastructure.

Presently, the FBI has a computer intrusion department named “CIP” that goes by other names as well, but their performance has been very poor in stopping major hacks into domestic government and private sector computer networks.

Just last week, I read a feedback column link that led to an article featuring a U.S. general stating America may begin to respond to cyber attacks with military force.

During the press conference today, President Obama spoke of people breaking the law by “hacking” into computers and “stealing intellectual property” (copyrights, trademarks and patents).

President Obama even referred to a company that lost $400,000,000 via this criminal practice. It appears Madonna and her associates in Hollywood have set the new standard for dirty business dealings in this regard among criminals, creating a nasty template for others to follow. Hollywood private investigator, Anthony Pellicano, had hackers on staff that specialized in this deceitful, illegal practice. Madonna was one of his clients.

As many of you have also witnessed, when I write something on the site that is unflattering about Madonna, my websites (and computers) get hacked, sabotaged and delayed.

Intellectual property theft is vile, cowardly, lazy and disgraceful. It says to the country and the world, one is too dumb and untalented to author creative works, therefore one will take the dishonorable route of stealing from others’ federally registered intellectual property.

In my case, the thefts of my copyrights became very malicious and sick. For example, Madonna’s cohorts at Lions Gate, a defendant in the 2005 Aisha v. Madonna case, which the latter bought out in violation of criminal statues, went so far, as to arrogantly and criminally steal more copyrights from me two years later in 2007.

The commercial and critical flop “Good Luck Chuck” was stolen from my copyrights. To be nasty, this is what they did with my preexisting copyright they butchered with their stupidity and vileness.

My preexisting copyright was a wonderful, romantic, fictitious movie treatment I wrote aboutan affluent man on a dating site and women finding out about it and flocking to him. The later released Lions Gate film “Good Luck Chuck” is about an affluent man, whose profile is posted on a dating site and women flocking to him.

That’s an illegal duplication of my copyright, which Madonna criminally gained an unlawfully made copy of, along with my voluminous Copyrighted Catalog, via criminal hacking, performed by Digilink, the company that began hosting her website Madonna.com several years ago.

Here’s where it gets really sick. In the infringing film “Good Luck Chuck” they added items not in my copyright, such as crass, pornographic sex scenes and a character named ANISHA which is one letter away from my real, legal name AISHA. Not to mention, the lead female character in the film, played by Jessica Alba, is named “CAM” and one of my private nicknames I use is “KAM” short for my middle name KAMILAH. They are both pronounced the same as well.

It was a stupid and criminally incriminating thing to do. The infringing film “Good Luck Chuck” constitutes major violations of the law and is more than enough to obtain a devastating indictment and convictions, for all involved, for criminal copyright infringement, computer intrusion and violations of various human rights laws.

Hollywood Pedophiles

Here’s where the infringement “Good Luck Chuck” gets even sicker. The character ANISHA starts off as an 8-year-old girl (which coincidentally is the age I immigrated to America from Jamaica).

To be nasty, they made this character a goth 8-year-old virgin wearing a leather bra, trying to lose her virginity in a closet with an 8-year-old boy (never happened to me by the way, as I took a Christian vow of chastity until marriage, which I wrote about on my site a few years ago in the Q&A section).

However, Lions Gate turned my wholesome, romantic, copyright about a grown, affluent man on a dating site and grown women finding out about it and flocking to him, into a nasty, depraved, promiscuous piece of pornographic garbage.

The nasty PEDOPHILES at Lions Gate should be locked up for not only criminal copyright infringement and hacking, but for filming and broadcasting that piece of nastiness featuring the character ANISHA, an 8-year-old, underage, preteen girl in a black leather bra, skimpy skirt, black lipstick and goth hairstyle, trying to have sex in a closet with an 8-year-old boy. The scene is disgusting and PEDOPHILIC. You’re nasty PEDOPHILES for thinking that is filmable entertainment.

It reveals the sick levels of mental illness present in Hollywood that they could do something so deplorable. This is the terrible level of mental illness the FBI has running loose around the streets of Los Angeles.

Hollywood is disgusting and severely mentally ill. You need serious counseling with a side order of institutionalization.

Imagine that. I have been quietly working on copyrights and patents to improve people’s health and you animals are criminally robbing and defaming me with my own copyrighted work, in criminal violation of the law. What nasty message do you think that sends to the public about you.

But, it is the same sick pattern of mental illness rearing its ugly head throughout the case I reported to the FBI that they claim they are investigating.

As mentioned the other day, Madonna recently, criminally stole another of my preexisting copyrights, that has been sitting in the Library of Congress in D.C. from 2006, that is my life story and ripped it off in a sick, obsessive manner, for her so-called directorial debut “Filth And Wisdom.”

The lead character in Madonna’s rip off “Filth And Wisdom” is an immigrant named A.K. aspiring to be a singer, writer and poet. In my 2006 preexisting copyrighted movie script, I star in the biopic as myself, an immigrant aspiring to be a singer, writer and poet, whose initials are A.K. (short for “Aisha Kamilah”).

What kind of sickos criminally steal copyrights from a writer, then include the defrauded writer’s name in the script as a character. That screams severe mental illness and sends the nation and the world a horrific message about Hollywood.

Madonna and co. even stole one of my copyrights about my homeland Jamaica, where I lived for years and Miami, where I’ve lived for two and a half decades, adding slurs to the script, sure to offend Jamaica and even started making arrangements to fly to Jamaica to begin filming it.

I’ve quietly been living in Miami for 25 years. I have no criminal record or history of strange conduct. I have a genius level IQ and spend my time at home, on my computers, doing research work and authoring patents and copyrights. I spend a lot of time authoring items for science and medical patents, to improve people’s health and quality of life.

I don’t bother people. I don’t go to clubs, industry parties, none of that. Yet, the aforementioned animals in Hollywood have been viciously targeting, robbing and attacking me, unprovoked and invading my privacy in very sick ways.

Who could be happy or pleased with that kind of criminal interference in their life. It’s disgraceful. The human rights abuses and civil rights violations I have been subjected to are so sick.

Her conduct and that of her cronies in Hollywood has been ugly and unjustifiable. There is no excuse for it.

Friday, May 29, 2009 – President Obama’s remarks on his administration’s cybersecurity review on Friday in the East Room of the White House:

…I know how it feels to have privacy violated because it has happened to me and the people around me. It’s no secret that my presidential campaign harnessed the Internet and technology to transform our politics. What isn’t widely known is that during the general election hackers managed to penetrate our computer systems. To all of you who donated to our campaign, I want you to all rest assured, our fundraising website was untouched. (Laughter.) So your confidential personal and financial information was protected.

But between August and October, hackers gained access to emails and a range of campaign files, from policy position papers to travel plans. And we worked closely with the CIA — with the FBI and the Secret Service and hired security consultants to restore the security of our systems. It was a powerful reminder: In this Information Age, one of your greatest strengths — in our case, our ability to communicate to a wide range of supporters through the Internet — could also be one of your greatest vulnerabilities…

But every day we see waves of cyber thieves trolling for sensitive information — the disgruntled employee on the inside, the lone hacker a thousand miles away, organized crime, the industrial spy and, increasingly, foreign intelligence services. In one brazen act last year, thieves used stolen credit card information to steal millions of dollars from 130 ATM machines in 49 cities around the world — and they did it in just 30 minutes. A single employee of an American company was convicted of stealing intellectual property reportedly worth $400 million. It’s been estimated that last year alone cyber criminals stole intellectual property from businesses worldwide worth up to $1 trillion.

In short, America’s economic prosperity in the 21st century will depend on cybersecurity…

This new approach starts at the top, with this commitment from me: From now on, our digital infrastructure — the networks and computers we depend on every day — will be treated as they should be: as a strategic national asset. Protecting this infrastructure will be a national security priority. We will ensure that these networks are secure, trustworthy and resilient. We will deter, prevent, detect, and defend against attacks and recover quickly from any disruptions or damage.

To give these efforts the high-level focus and attention they deserve — and as part of the new, single National Security Staff announced this week — I’m creating a new office here at the White House that will be led by the Cybersecurity Coordinator. Because of the critical importance of this work, I will personally select this official. I’ll depend on this official in all matters relating to cybersecurity, and this official will have my full support and regular access to me as we confront these challenges…